fix some validation checks in dns response parsing code
authorRich Felker <dalias@aerifal.cx>
Tue, 3 Jun 2014 05:43:29 +0000 (01:43 -0400)
committerRich Felker <dalias@aerifal.cx>
Tue, 3 Jun 2014 05:43:29 +0000 (01:43 -0400)
commitac2a7893427b6c94f05609d214178f8d5a18b333
treef1b3b8cdc8130be55c1327023a02c4c6686f101b
parent8fba4458afb7304b32ca887e4a3990c6029131f9
fix some validation checks in dns response parsing code

since the buffer passed always has an actual size of 512 bytes, the
maximum possible response packet size, no out-of-bounds access was
possible; however, reading past the end of the valid portion of the
packet could cause the parser to attempt to process junk as answer
content.
src/network/dns_parse.c